|
|
|
Fahad Alqahtani, Mohammed Almutairi and Frederick T. Sheldon
This study provides a comprehensive review and comparative analysis of existing Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data leakage in complex cloud systems. Traditional methods impose significant overhead o...
ver más
|
|
|
|
|
|
|
Uma Rajasekaran, Mohanaprasad Kothandaraman and Chang Hong Pua
Significant water loss caused by pipeline leaks emphasizes the importance of effective pipeline leak detection and localization techniques to minimize water wastage. All of the state-of-the-art approaches use deep learning (DL) for leak detection and cro...
ver más
|
|
|
|
|
|
|
Daniel Barros, Isabela Almeida, Ariele Zanfei, Gustavo Meirelles, Edevar Luvizotto, Jr. and Bruno Brentan
Leakages in distribution networks reach more than 30% of the water supplied, entailing important risks for the water infrastructure with water contamination issues. Therefore, it is necessary to develop new methods to mitigate the amount of water wastes....
ver más
|
|
|
|
|
|
|
Oscar Scussel, Michael J. Brennan, Fabrício Cézar L. de Almeida, Mauricio K. Iwanaga, Jennifer M. Muggleton, Phillip F. Joseph and Yan Gao
The frequency range of the leak noise in buried water pipes, measured using acoustic correlators, depends significantly on the type of pipe and its location as well as the type of sensors used. Having a rough idea of this frequency range can be beneficia...
ver más
|
|
|
|
|
|
|
Likittanawong Supawat and Leemakdej Arnat
Studies that quantify the price impact of the information in corporate press releases and news articles mainly focus on quantitative news, such as earnings announcements, dividends, and financial performance-related events, but leave out other corporate ...
ver más
|
|
|
|
|
|
|
José García, Andres Leiva-Araos, Emerson Diaz-Saavedra, Paola Moraga, Hernan Pinto and Víctor Yepes
Water infrastructure integrity, quality, and distribution are fundamental for public health, environmental sustainability, economic development, and climate change resilience. Ensuring the robustness and quality of water infrastructure is pivotal for sec...
ver más
|
|
|
|
|
|
|
Au?rius Juozapavicius, Agne Brilingaite, Linas Bukauskas and Ricardo Gregorio Lugo
Password hygiene plays an essential part in securing systems protected with single-factor authentication. A significant fraction of security incidents happen due to weak or reused passwords. The reasons behind differences in security vulnerable behaviour...
ver más
|
|
|
|
|
|
|
Dominik Wunderlich, Daniel Bernau, Francesco Aldà, Javier Parra-Arnau and Thorsten Strufe
Hierarchical text classification consists of classifying text documents into a hierarchy of classes and sub-classes. Although Artificial Neural Networks have proved useful to perform this task, unfortunately, they can leak training data information to ad...
ver más
|
|
|
|
|
|
|
S. V. Hayrapetyan,K.S. Zaytsev
Pág. 30 - 38
The purpose of this paper is to describe the developed method of detecting network covert timing channels, based on machine learning algorithms. Detection of network covert channels is an actual problem, since the latter can be used to leak confidential ...
ver más
|
|
|
|
|
|
|
Thejaswini P, Vivekananda G, Anu H, Priya R, Krishna Prasad B S, Nischay M
Pág. 370 - 388
Today's Multiprocessor System-on-Chip (MPSoC) contains many cores and integrated circuits. Due to the current requirements of communication, we make use of Network-on-Chip (NoC) to obtain high throughput and low latency. NoC is a communication architectu...
ver más
|
|
|
|